ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Projectsend
Projectsend projectsend |
|
CPEs | cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:* | |
Vendors & Products |
Projectsend
Projectsend projectsend |
|
Metrics |
ssvc
|
Tue, 26 Nov 2024 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript. | |
Title | ProjectSend Unauthenticated Configuration Modification | |
Weaknesses | CWE-287 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: VulnCheck
Published: 2024-11-26T09:55:23.588Z
Updated: 2024-11-26T14:20:14.269Z
Reserved: 2024-11-25T15:03:30.218Z
Link: CVE-2024-11680
Vulnrichment
Updated: 2024-11-26T14:19:04.072Z
NVD
Status : Received
Published: 2024-11-26T10:15:04.540
Modified: 2024-11-26T10:15:04.540
Link: CVE-2024-11680
Redhat
No data.